officecli-docx
Fail
Audited by Gen Agent Trust Hub on Apr 26, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The skill instructions direct the agent to install the
officecliutility by downloading and executing scripts directly from a remote GitHub repository usingcurl | bashandirm | iex. This method of installation executes unverified code from the internet and is a high-risk pattern. - [COMMAND_EXECUTION]: The skill utilizes the
officeclitool to interact with the local file system and perform complex operations on.docxfiles, including structure modification and raw XML injection. - [PROMPT_INJECTION]: An indirect prompt injection surface is present because the skill extracts and processes text from external Word documents.
- Ingestion points: Document content is read into the agent's context using the
view text,view annotated, andgetcommands. - Boundary markers: There are no delimiters or instructions to the agent to disregard instructions that may be embedded within the document content.
- Capability inventory: The skill has the ability to write to the file system and modify document internals via the
officeclitool. - Sanitization: Extracted document content is processed directly without filtering or sanitization.
Recommendations
- HIGH: Downloads and executes remote code from: https://raw.githubusercontent.com/iOfficeAI/OfficeCLI/main/install.sh - DO NOT USE without thorough review
Audit Metadata